Support Get Quote

Two-factor Authentication

Two-factor authentication for improved security of EventLog Analyzer accounts

Most SIEM solutions contain a great deal of sensitive information on events happening across a network, which means ensuring secure access to these solutions is crucial for network security.

This is why EventLog Analyzer utilizes two-factor authentication to ensure that only authorized users access the solution. With two-factor authentication enabled, users are verified twice during login—once with a password and again with a one-time password (OTP) sent to a registered mobile number or email address.

Two-factor authentication can secure your sensitive data even if your password is compromised. This double authentication method is essential, because cybercriminals are constantly looking to breach networks using stolen credentials.

Do you still need two-factor authentication if you have a strong password?

A strong password is an essential part of keeping your EventLog Analyzer account safe, since this will be your first line of defense against potential attacks. But using a password alone isn't always the most effective way to secure an account. Passwords are becoming less effective because of increasingly sophisticated password cracking attacks, such as brute force, dictionary, and keylogger attacks.

Two-factor authentication eliminates the risks of password cracking attacks, since the OTP is sent directly to the user and cannot be replicated. Having multiple factors in the authentication process greatly enhances the security of an account, keeping malicious users from accessing sensitive information.

Two-factor authentication methods in EventLog Analyzer

EventLog Analyzer has a list of options to choose from to set your preferred two-factor authentication method.

Email verification

When email verification is enabled, a verification code will be sent to your registered email address. This code has to be entered in addition to the password before you can log into your account.

SMS verification

When this feature is enabled, an SMS with the verification code will be sent to the registered mobile number. The code needs to be entered before you can log in.

Google Authenticator

With this verification method, a six-digit verification code will be generated in the Google Authenticator app. This code has to be entered in the required field before you can log in.


When the RSA SecurID feature is enabled, the security code generated by the RSA SecurID mobile app or security token sent via SMS or email will have to be entered before you can log in.

Duo Security

If verification via Duo Security is enabled, you can log in by entering a six-digit security code sent via SMS, phone call, or push notification from the app.

Backup verification codes

If the registered device is not available or if you are unable to receive the one-time password (OTP), backup verification codes can be used to log in. These backup codes can be generated while logging into your account for which two-factor authentication has been configured. Keeping a copy of these codes handy is a fail-safe mechanism to ensure that you can log into your account even at the event of your device getting lost.

Configuring two-factor authentication for EventLog Analyzer.

EventLog Analyzer Trusted By

Los Alamos National Bank Michigan State University
Panasonic Comcast
Oklahoma State University IBM
Accenture Bank of America
Ernst Young

Customer Speaks

  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

Awards and Recognitions

A Single Pane of Glass for Comprehensive Log Management